UDP Files ≈ Packet StormPacket Storm - Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapershttps://packetstormsecurity.com/
en-usTue, 22 Jan 2019 01:31:05 GMTPacket Storm144400https://packetstormsecurity.com/
https://ssl.google-analytics.com/__utm.gif?utmwv=1.3&utmn=1233971243&utmcs=ISO-8859-1&utmsr=31337x31337&utmsc=32-bit&utmul=en-us&utmje=0&utmfl=-&utmcn=1&utmdt=UDP%20Files%u2248%20Packet%20Storm&utmhn=packetstormsecurity.com&utmr=-&utmp=%2Ffiles%2Ftags%2Fudp%2F&utmac=UA-18885198-1&utmcc=__utma%3D32867617.1233971243.1548120665.1548120665.1548120665.1%3B%2B__utmz%3D32867617.1548120665.1.1.utmccn%3D(direct)%7Cutmcsr%3D(direct)%7Cutmcmd%3D(none)Avahi 0.7 Denial Of Servicehttps://packetstormsecurity.com/files/150494/avahi07-dos.txt
https://packetstormsecurity.com/files/150494/avahi07-dos.txthttps://packetstormsecurity.com/files/150494/Avahi-0.7-Denial-Of-Service.htmlWed, 28 Nov 2018 17:48:02 GMTAvahi-daemon in Avahi version through 0.7 inadvertently sends Legacy Unicast Responses to IPv4 unicast queries with source addresses that are not link-local, which allows remote attackers to cause a denial of service (traffic amplification) or obtain potentially sensitive information via port-5353 UDP packets.Red Hat Security Advisory 2018-2331-01https://packetstormsecurity.com/files/149006/RHSA-2018-2331-01.txt
https://packetstormsecurity.com/files/149006/RHSA-2018-2331-01.txthttps://packetstormsecurity.com/files/149006/Red-Hat-Security-Advisory-2018-2331-01.htmlMon, 20 Aug 2018 17:01:56 GMTRed Hat Security Advisory 2018-2331-01 - memcached is a high-performance, distributed memory object caching system, generic in nature, but intended for use in speeding up dynamic web applications by alleviating database load. Security fix: memcached: UDP server support allows spoofed traffic amplification DoS For more details about the security issue, including the impact, a CVSS score, and other related information, refer to the CVE page listed in the References section. Issues addressed include a denial of service vulnerability.Linux Kernel UDP Fragmentation Offset (UFO) Privilege Escalationhttps://packetstormsecurity.com/files/148795/ufo_privilege_escalation.rb.txt
https://packetstormsecurity.com/files/148795/ufo_privilege_escalation.rb.txthttps://packetstormsecurity.com/files/148795/Linux-Kernel-UDP-Fragmentation-Offset-UFO-Privilege-Escalation.htmlFri, 03 Aug 2018 02:17:24 GMTThis Metasploit module attempts to gain root privileges on Linux systems by abusing UDP Fragmentation Offload (UFO). This exploit targets only systems using Ubuntu (Trusty / Xenial) kernels 4.4.0-21 <= 4.4.0-89 and 4.8.0-34 <= 4.8.0-58, including Linux distros based on Ubuntu, such as Linux Mint. The target system must have unprivileged user namespaces enabled and SMAP disabled. Bypasses for SMEP and KASLR are included. Failed exploitation may crash the kernel. This Metasploit module has been tested successfully on various Ubuntu and Linux Mint systems, including: Ubuntu 14.04.5 4.4.0-31-generic x64 Desktop; Ubuntu 16.04 4.8.0-53-generic; Linux Mint 17.3 4.4.0-89-generic; Linux Mint 18 4.8.0-58-genericMalbait TCP/UDP Honeypothttps://packetstormsecurity.com/files/148261/Malbait-master.zip
https://packetstormsecurity.com/files/148261/Malbait-master.ziphttps://packetstormsecurity.com/files/148261/Malbait-TCP-UDP-Honeypot.htmlWed, 20 Jun 2018 17:02:22 GMTMalbait is a honeypot written in perl. It creates fake servers and supports both TCP and UDP protocols, either singly or in combination. It outputs in CSV format as well as giving more detailed text reports. You can serve fake Telnet, FTP, SMTP, POP3, HTTP, TR-69, IMAP, asciitime, systat and echo servers, as well as serving blank or random output.GNUnet P2P Framework 0.11.0pre66https://packetstormsecurity.com/files/148231/gnunet-0.11.0pre66.tar.gz
https://packetstormsecurity.com/files/148231/gnunet-0.11.0pre66.tar.gzhttps://packetstormsecurity.com/files/148231/GNUnet-P2P-Framework-0.11.0pre66.htmlWed, 06 Jun 2018 14:44:44 GMTGNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP (IPv4 and IPv6), TCP (IPv4 and IPv6), HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing.Reptile LKM Rootkithttps://packetstormsecurity.com/files/147919/Reptile-master.zip
https://packetstormsecurity.com/files/147919/Reptile-master.ziphttps://packetstormsecurity.com/files/147919/Reptile-LKM-Rootkit.htmlSun, 27 May 2018 13:22:22 GMTReptile is a Linux kernel module rootkit that hides files, processes, etc. It implements ICMP/UDP/TCP port-knocking backdoors, supports kernels 2.6.x/3.x/4.x, and more.ASUS infosvr Authentication Bypass Command Executionhttps://packetstormsecurity.com/files/147284/asus_infosvr_auth_bypass_exec.rb.txt
https://packetstormsecurity.com/files/147284/asus_infosvr_auth_bypass_exec.rb.txthttps://packetstormsecurity.com/files/147284/ASUS-infosvr-Authentication-Bypass-Command-Execution.htmlSat, 21 Apr 2018 15:46:55 GMTThis Metasploit module exploits an authentication bypass vulnerability in the infosvr service running on UDP port 9999 on various ASUS routers to execute arbitrary commands as root. This Metasploit module launches the BusyBox Telnet daemon on the port specified in the TelnetPort option to gain an interactive remote shell. This Metasploit module was tested successfully on an ASUS RT-N12E with firmware version 2.0.0.35. Numerous ASUS models are reportedly affected, but untested.Nmap Port Scanner 7.70https://packetstormsecurity.com/files/146850/nmap-7.70.tgz
https://packetstormsecurity.com/files/146850/nmap-7.70.tgzhttps://packetstormsecurity.com/files/146850/Nmap-Port-Scanner-7.70.htmlWed, 21 Mar 2018 02:28:14 GMTNmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.Red Hat Security Advisory 2018-0479-01https://packetstormsecurity.com/files/146719/RHSA-2018-0479-01.txt
https://packetstormsecurity.com/files/146719/RHSA-2018-0479-01.txthttps://packetstormsecurity.com/files/146719/Red-Hat-Security-Advisory-2018-0479-01.htmlMon, 12 Mar 2018 04:44:44 GMTRed Hat Security Advisory 2018-0479-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 7.1.1 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.1.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix: artemis/hornetq: memory exhaustion via UDP and JGroups discovery.Red Hat Security Advisory 2018-0480-01https://packetstormsecurity.com/files/146718/RHSA-2018-0480-01.txt
https://packetstormsecurity.com/files/146718/RHSA-2018-0480-01.txthttps://packetstormsecurity.com/files/146718/Red-Hat-Security-Advisory-2018-0480-01.htmlMon, 12 Mar 2018 03:33:33 GMTRed Hat Security Advisory 2018-0480-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 7.1.1 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.1.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix: artemis/hornetq: memory exhaustion via UDP and JGroups discovery.Red Hat Security Advisory 2018-0478-01https://packetstormsecurity.com/files/146717/RHSA-2018-0478-01.txt
https://packetstormsecurity.com/files/146717/RHSA-2018-0478-01.txthttps://packetstormsecurity.com/files/146717/Red-Hat-Security-Advisory-2018-0478-01.htmlMon, 12 Mar 2018 01:11:11 GMTRed Hat Security Advisory 2018-0478-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 7.1.1 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.1.0, and includes bug fixes and enhancements. Security Fix: artemis/hornetq: memory exhaustion via UDP and JGroups discovery.Ubuntu Security Notice USN-3588-1https://packetstormsecurity.com/files/146648/USN-3588-1.txt
https://packetstormsecurity.com/files/146648/USN-3588-1.txthttps://packetstormsecurity.com/files/146648/Ubuntu-Security-Notice-USN-3588-1.htmlMon, 05 Mar 2018 22:24:00 GMTUbuntu Security Notice 3588-1 - Daniel Shapira discovered an integer overflow issue in Memcached. A remote attacker could use this to cause a denial of service. It was discovered that Memcached listened to UDP by default. A remote attacker could use this as part of a distributed denial of service attack.AsusWRT LAN Unauthenticated Remote Code Executionhttps://packetstormsecurity.com/files/146560/asuswrt_lan_rce.rb.txt
https://packetstormsecurity.com/files/146560/asuswrt_lan_rce.rb.txthttps://packetstormsecurity.com/files/146560/AsusWRT-LAN-Unauthenticated-Remote-Code-Execution.htmlFri, 23 Feb 2018 17:52:32 GMTThe HTTP server in AsusWRT has a flaw where it allows an unauthenticated client to perform a POST in certain cases. This can be combined with another vulnerability in the VPN configuration upload routine that sets NVRAM configuration variables directly from the POST request to enable a special command mode. This command mode can then be abused by sending a UDP packet to infosvr, which is running on port UDP 9999 to directly execute commands as root. This exploit leverages that to start telnetd in a random port, and then connects to it. It has been tested with the RT-AC68U running AsusWRT Version 3.0.0.4.380.7743.Red Hat Security Advisory 2018-0275-01https://packetstormsecurity.com/files/146261/RHSA-2018-0275-01.txt
https://packetstormsecurity.com/files/146261/RHSA-2018-0275-01.txthttps://packetstormsecurity.com/files/146261/Red-Hat-Security-Advisory-2018-0275-01.htmlMon, 05 Feb 2018 18:18:00 GMTRed Hat Security Advisory 2018-0275-01 - The jboss-ec2-eap packages provide scripts for Red Hat JBoss Enterprise Application Platform running on the Amazon Web Services Elastic Compute Cloud. With this update, the jboss-ec2-eap package has been updated to ensure compatibility with Red Hat JBoss Enterprise Application Platform 6.4.19. Security Fix: It was found that when Artemis and HornetQ are configured with UDP discovery and JGroups discovery a huge byte array is created when receiving an unexpected multicast message. This may result in a heap memory exhaustion, full GC, or OutOfMemoryError. Red Hat Security Advisory 2018-0270-01https://packetstormsecurity.com/files/146247/RHSA-2018-0270-01.txt
https://packetstormsecurity.com/files/146247/RHSA-2018-0270-01.txthttps://packetstormsecurity.com/files/146247/Red-Hat-Security-Advisory-2018-0270-01.htmlMon, 05 Feb 2018 03:37:00 GMTRed Hat Security Advisory 2018-0270-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.19 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.18, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix: It was found that when Artemis and HornetQ are configured with UDP discovery and JGroups discovery a huge byte array is created when receiving an unexpected multicast message. This may result in a heap memory exhaustion, full GC, or OutOfMemoryError. Red Hat Security Advisory 2018-0271-01https://packetstormsecurity.com/files/146245/RHSA-2018-0271-01.txt
https://packetstormsecurity.com/files/146245/RHSA-2018-0271-01.txthttps://packetstormsecurity.com/files/146245/Red-Hat-Security-Advisory-2018-0271-01.htmlMon, 05 Feb 2018 03:34:00 GMTRed Hat Security Advisory 2018-0271-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.19 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.18, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix: It was found that when Artemis and HornetQ are configured with UDP discovery and JGroups discovery a huge byte array is created when receiving an unexpected multicast message. This may result in a heap memory exhaustion, full GC, or OutOfMemoryError. Red Hat Security Advisory 2018-0268-01https://packetstormsecurity.com/files/146244/RHSA-2018-0268-01.txt
https://packetstormsecurity.com/files/146244/RHSA-2018-0268-01.txthttps://packetstormsecurity.com/files/146244/Red-Hat-Security-Advisory-2018-0268-01.htmlMon, 05 Feb 2018 03:33:00 GMTRed Hat Security Advisory 2018-0268-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.19 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.18, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix: It was found that when Artemis and HornetQ are configured with UDP discovery and JGroups discovery a huge byte array is created when receiving an unexpected multicast message. This may result in a heap memory exhaustion, full GC, or OutOfMemoryError. Red Hat Security Advisory 2018-0269-01https://packetstormsecurity.com/files/146242/RHSA-2018-0269-01.txt
https://packetstormsecurity.com/files/146242/RHSA-2018-0269-01.txthttps://packetstormsecurity.com/files/146242/Red-Hat-Security-Advisory-2018-0269-01.htmlMon, 05 Feb 2018 01:01:00 GMTRed Hat Security Advisory 2018-0269-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.19 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.18, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix: It was found that when Artemis and HornetQ are configured with UDP discovery and JGroups discovery a huge byte array is created when receiving an unexpected multicast message. This may result in a heap memory exhaustion, full GC, or OutOfMemoryError. ZyXEL P-660HW UDP Denial Of Servicehttps://packetstormsecurity.com/files/145863/zyxelp660hw-dos.txt
https://packetstormsecurity.com/files/145863/zyxelp660hw-dos.txthttps://packetstormsecurity.com/files/145863/ZyXEL-P-660HW-UDP-Denial-Of-Service.htmlFri, 12 Jan 2018 16:57:53 GMTZyXEL P-660HW suffers from a UDP fragmentation denial of service vulnerability.Red Hat Security Advisory 2017-3399-01https://packetstormsecurity.com/files/145263/RHSA-2017-3399-01.txt
https://packetstormsecurity.com/files/145263/RHSA-2017-3399-01.txthttps://packetstormsecurity.com/files/145263/Red-Hat-Security-Advisory-2017-3399-01.htmlThu, 07 Dec 2017 19:24:00 GMTRed Hat Security Advisory 2017-3399-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This asynchronous patch is a security update for log4j package in Red Hat JBoss Enterprise Application Platform 5.2.0. Security Fix: It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application. Red Hat Security Advisory 2017-3400-01https://packetstormsecurity.com/files/145262/RHSA-2017-3400-01.txt
https://packetstormsecurity.com/files/145262/RHSA-2017-3400-01.txthttps://packetstormsecurity.com/files/145262/Red-Hat-Security-Advisory-2017-3400-01.htmlThu, 07 Dec 2017 19:23:00 GMTRed Hat Security Advisory 2017-3400-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This asynchronous patch is a security update for log4j package in Red Hat JBoss Enterprise Application Platform 5.2.0. Security Fix: It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application. Red Hat Security Advisory 2017-2888-01https://packetstormsecurity.com/files/144596/RHSA-2017-2888-01.txt
https://packetstormsecurity.com/files/144596/RHSA-2017-2888-01.txthttps://packetstormsecurity.com/files/144596/Red-Hat-Security-Advisory-2017-2888-01.htmlThu, 12 Oct 2017 23:35:31 GMTRed Hat Security Advisory 2017-2888-01 - Red Hat JBoss BRMS is a business rules management system for the management, storage, creation, modification, and deployment of JBoss Rules. This release of Red Hat JBoss BRMS 6.4.6 serves as a replacement for Red Hat JBoss BRMS 6.4.5, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix: It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application. Red Hat Security Advisory 2017-2809-01https://packetstormsecurity.com/files/144360/RHSA-2017-2809-01.txt
https://packetstormsecurity.com/files/144360/RHSA-2017-2809-01.txthttps://packetstormsecurity.com/files/144360/Red-Hat-Security-Advisory-2017-2809-01.htmlWed, 27 Sep 2017 06:16:28 GMTRed Hat Security Advisory 2017-2809-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 7.0.8 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.0.7, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix: It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application. Red Hat Security Advisory 2017-2808-01https://packetstormsecurity.com/files/144358/RHSA-2017-2808-01.txt
https://packetstormsecurity.com/files/144358/RHSA-2017-2808-01.txthttps://packetstormsecurity.com/files/144358/Red-Hat-Security-Advisory-2017-2808-01.htmlWed, 27 Sep 2017 06:16:07 GMTRed Hat Security Advisory 2017-2808-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 7.0.8 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.0.7, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix: It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application. Red Hat Security Advisory 2017-2810-01https://packetstormsecurity.com/files/144347/RHSA-2017-2810-01.txt
https://packetstormsecurity.com/files/144347/RHSA-2017-2810-01.txthttps://packetstormsecurity.com/files/144347/Red-Hat-Security-Advisory-2017-2810-01.htmlTue, 26 Sep 2017 03:56:00 GMTRed Hat Security Advisory 2017-2810-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 7.0.8 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.0.7, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix: It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application.